Welcome![Sign In][Sign Up]
Location:
Search - algorithm of des

Search list

[Crack Hackdes

Description: 网络安全编程之des加密算法实现有demo-Programming of network security encryption algorithm des realize there demo
Platform: | Size: 38912 | Author: kaz | Hits:

[CA authDES

Description: 国际知名的DES算法,完整的源代码,各个函数正确编写-Internationally well-known DES algorithm, the complete source code, the correct preparation of the various functions
Platform: | Size: 3072 | Author: 陈俊卿 | Hits:

[Windows DevelopDES

Description: 本人03年写的一个可以成批加解密文件的程序,里面的核心算法使自己写的花了不少时间,希望能对需要的人有所帮助。-In 2003 I wrote a batch file encryption and decryption procedures, which the core algorithm to make their own flower wrote a lot of time, hoping to help people in need.
Platform: | Size: 69632 | Author: 王晓峰 | Hits:

[Crack HackDES_zyj

Description: 利用VC写的关于DES算法,可以对8bit,64位的数据进行加密,可以显示-VC wrote on the use of DES algorithm, can be 8bit, 64-bit data encryption, can show
Platform: | Size: 1893376 | Author: 王智勇 | Hits:

[Crack HackDES

Description: DES算法的实现,有详细的注释,这个程序实现的功能很齐全,基本不用修改就可以使用-DES algorithm, there are detailed notes, realize the function of this process is complete, the basic need not be amended to use
Platform: | Size: 3072 | Author: 陈静相 | Hits:

[Crack HackDES

Description: 用C语言写的100行DES加密算法. DES算法具有极高安全性,到目前为止,除了用穷举搜索法对DES算法进行攻击外,还没有发现更有效的办法。而56位长的密钥的穷举空间为256,这意味着如果一台计算机的速度是每一秒种检测一百万个密钥,则它搜索完全部密钥就需要将近2285年的时间,可见,这是难以实现的,当然,随着科学技术的发展,当出现超高速计算机后,我们可考虑把DES密钥的长度再增长一些,以此来达到更高的保密程度。-Using C language to write 100 lines of the DES encryption algorithm. DES algorithm has high security, so far, except by exhaustive search attack on the DES algorithm, but also found no more effective way. And 56 long exhaustive key space for the 256, which means that if a computer s speed is detected every second of one million keys, it searches entirely on the needs of key Department of nearly 2285 time can be seen, it is difficult to realize, of course, with the development of science and technology, when the emergence of ultra-high-speed computer, we can consider the DES key length and then some growth in order to achieve higher levels of security.
Platform: | Size: 7168 | Author: JohnBill | Hits:

[Crack Hack3des

Description: 3des加密解密算法的一个c++实现。 网络字符串加密时可以使用。-3DES encryption and decryption algorithm of a c++ Achieve. Network can use string encryption.
Platform: | Size: 6144 | Author: chenchen | Hits:

[VC/MFCDES_PC

Description: 本程序是DES加密系统的c语言源程序,它很可能是使用最广泛的秘钥系统,特别是在保护金融数据的安全中,通常,自动取款机(Automated Teller Machine,ATM)都使用 DES。 -This procedure is the DES encryption system c language source code, it is likely to be the most widely used secret key system, especially in protecting the safety of financial data, usually, ATM (Automated Teller Machine, ATM) are the use of DES.
Platform: | Size: 8192 | Author: 王伟韬 | Hits:

[OtherDES_CFB

Description: 基于CFB模式的DES算法的实现,控制台输出,只需修改main中的加密密钥和加密内容即可-CFB mode of DES-based algorithm, the console output, just modify the main encryption key and encrypted content can be
Platform: | Size: 187392 | Author: 李洪昌 | Hits:

[JSP/Javades

Description: des算法的说明和实用,采用JAVA描述。-des algorithm description and practical description of the use of JAVA.
Platform: | Size: 175104 | Author: | Hits:

[ICQ-IM-ChatClient-Server-based-Security-Comunication-Tool

Description: 自己用Java编的Client-Server聊天程序,结合了网络通信、数据安全、多线程的知识 1.使用RSA算法完成DES密钥的分配; 2.使用MD5结合RSA算法完成对消息的签名; 3.对原有消息及签名提供机密性保护(用DES算法加密); 4.能够解密并验证签名的合法性 -Their use of Java made the Client-Server chat program, a combination of network communications, data security, knowledge of multi-threaded one. RSA algorithm using the completion of the distribution of DES keys 2. RSA algorithm combines the use of MD5 message to complete the signature 3. The original message and signature to provide confidentiality protection (with DES encryption algorithm) 4. Able to decrypt and verify the legitimacy of the signature
Platform: | Size: 8192 | Author: Shadow | Hits:

[Crack HackDES

Description: Des算法是一种标准的对称加密算法,其精华就是明文经过一系列的复杂变化后,一般在不知密码的情况下要把它的恢复很难。 算法可以由四个部分描述: 1.获取16个子密钥 2.初始置换置换函数ip 3.加密函数f 4.末置换函数 -Des Algorithm is a standard symmetric encryption algorithm, and its essence is clear after a series of complex changes in law, the general in the circumstances I do not know the password should be difficult to restore it. Algorithm can be described in four parts: 1. To obtain 16 sub-keys 2. The initial replacement replacement function ip 3. Cryptographic function f 4. At the end of displacement function
Platform: | Size: 180224 | Author: wildkaede | Hits:

[Crack HackDES

Description: 这个程序主要实现了DES加密算法,分为文件加密和字符串加密-The main achievement of this process the DES encryption algorithm is divided into file encryption and string encryption
Platform: | Size: 1963008 | Author: 丁涛 | Hits:

[Crack HackDES

Description: 用C语言写的100行DES加密算法,可以帮助大家学习-Using C language to write 100 lines of the DES encryption algorithm that can help everyone learn
Platform: | Size: 7168 | Author: mengjian | Hits:

[Crack HackDES

Description: DES算法源代码,这是自己书写的源代码,里面采用了非常多的技巧来提高编解码的效率,研究算法和源码的朋友们,我书写的这个代码可以作为你们很好的参考。-DES algorithm source code, which is writing its own source code, which uses a lot of skills to improve the efficiency of the codec to study the algorithms and source of my friends, I am writing you this code can be used as a good reference.
Platform: | Size: 3785728 | Author: yyl | Hits:

[Crack HackDES

Description: 输入任意长明文及8位密钥,用DES加密算法加密生成密文-Input of arbitrary length and 8 expressly key, with DES encryption algorithm to generate encrypted ciphertext
Platform: | Size: 34816 | Author: 张鹏 | Hits:

[Crack HackDES

Description: 说明:des算法的实现代码 */ 能够实现56位或56*n密钥的des算法,可以通过该程序提供的接 进行数据的加密,保证数据在传送过程的安全性-Description: des algorithm realize the code*/can be achieved 56 or 56* n keys des algorithm, can be provided through the program access data encryption to ensure data security during transmission of
Platform: | Size: 38912 | Author: yetao | Hits:

[Crack HackDES

Description: 通信保密中的des算法的实现,用VC实现-Confidential communications of des algorithm using VC to achieve
Platform: | Size: 167936 | Author: 张兰 | Hits:

[Crack HackDES

Description: 用C编写的DES加密算法,通过运行。其中运用二叉树实现,只是例子,并不通用。为word格式。 -C prepared by DES encryption algorithm, by running. Which the realization of the use of binary tree, only examples, not generic. For the word format.
Platform: | Size: 6144 | Author: 郑正 | Hits:

[Crack HackDES

Description: des加密的算法的源程序。是用DELPHI做-des encryption algorithm of the source. DELPHI is done
Platform: | Size: 6144 | Author: lyl | Hits:
« 1 2 3 45 6 7 8 9 10 ... 41 »

CodeBus www.codebus.net